Synopsis
Is your organization agile and secure enough to survive? Join Cherie Caswell Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.Presented by Forsythe.
Episodes
-
Why the Cloud Journey Must Be Transformational
08/07/2019 Duration: 14minIn the drive to transform and modernize IT, a successful and agile journey to the cloud starts with a clear understanding of an organizations culture. A move to cloud must be viewed as transformational, and companies must be poised to foster long-term changes in their people, processes and culture. Listen to this episode to learn: The questions organizations should ask about their culture. How the answers can lead you to a successful cloud journey. How to strive for the same business value of a cloud native organization.
-
The Big Data Theory: The Peculiar World of IoT
27/06/2019 Duration: 30minIoT Technology is extremely complex, but its true value lies in its unlimited possibilities to improve business outcomes. Are you leveraging any Internet of Things (IoT) solutions to enhance your customer experience, improve efficiency, or reduce overhead? Do you have access to all of the data you need to be a strategic player in your industry? We’re speaking with industry expert Scott Davis to learn how to best navigate the big data and IoT space. Listen to this episode to learn: How to connect the dots between your data and your infrastructure What a good IoT strategy looks like Best practices for blending and integrating data How to uncover potential problems after launching
-
Optimizing End User Experience in a BYOD World
21/05/2019 Duration: 25minThe age of the digital workforce has arrived, and with it comes a new set of expectations from employees in the workplace. Next-gen professionals want real-time data at their fingertips. Embracing a digital workspace results in a more productive and empowered workforce by delivering an enhanced employee experience through smarter connections, collaboration and communication. Listen to this episode to learn: Key challenges that bring-your-own-device (BYOD) policies are creating for IT leaders Top ways businesses can optimize end user experience Benefits of a Windows 10 migration strategy
-
Ins and Outcomes: The Data Journey - Insight, Prediction and Recommendation
17/05/2019 Duration: 44min -
-
-
-
Building a Secure Digital Workspace
26/03/2019 Duration: 14minIn today’s digital age it has become expected for businesses to provide a great employee experience, especially around the ability to work remotely. But how does a business start developing a remote workforce strategy and how can they address their concerns about providing a digital workspace? Listen to this episode to learn: Why it’s important to have a remote workforce option The benefits to the employees and to your business What to consider when preparing a remote workforce strategy The best digital solutions to utilize
-
Why Are IT Leaders Making the Shift Toward IT Services?
12/03/2019 Duration: 22minOne common IT issue every business can relate to: effectively managing their business-critical data. If you can get past dealing with unpredictable growth, over-provisioning and under-provisioning, you’ll also have to survive painful forklift upgrades every three to five years. Sweet. It can be tough to forecast your organization’s needs. The purchasing and procurement process can be time consuming and inefficient, often accounting for the peak, or worst-case scenario, rather than the expected day-to-day usage. With limited human and financial resources, IT leaders are looking to storage services and subscription options to accommodate growth gaps. Listen to this episode to learn: Escape dated storage practices Learn how to leverage public cloud and scale workloads across your environment Understand the modern storage-as-a-service model Find out why IT leaders are making the shift toward IT services
-
The Critical Condition of Healthcare IT
05/02/2019 Duration: 25minWith advances in technology, healthcare providers now have access to sophisticated imaging systems that have improved medical diagnostics. Newer digital modalities produce higher resolution and better-quality images that enable more accurate clinical decisions. But this benefit comes at a cost. From MRIs to multi-slice CTs, tomosynthesis, cardiac imaging, and more, imaging data is growing at a staggering rate. As we transition from the digital age to the data age, an increasing number of healthcare organizations are challenged by overwhelming data growth. The introduction of nontraditional imaging and the requirements of managing larger imaging studies are affecting the ability to share data between remote facilities, meet retention guidelines, and recover from outages without sacrificing accessibility or availability, both of which are crucial for efficient operation and effective patient care. Listen to this episode to learn: Learn the three keys to effective EHR optimization How to effectively bring in da
-
Overcoming 5 Challenges Associated with Future-Proofing Your Enterprise Network
29/01/2019 Duration: 11minTransforming enterprise networks and investing in improved technology can create a more secure organization, and one better aligned to tackle the demands of today’s always-on IT landscape. Become better prepared for seamless integration into future-state IT by listening to these 5 tips on overcoming some of the challenges associated with future-proofing enterprise networks: MAXIMIZE NETWORK SECURITY COPE WITH NETWORK EVOLUTION RE-ARCHITECT WIDE AREA NETWORKS CAPTURE NETWORK ANALYTICS AND PERFORMANCE ENABLE AUTOMATION Taking the next steps to digitize enterprise networks allows organizations to stay up to speed with the ever-changing demands of the digital era. A more comprehensive security strategy will not only make an organization more secure, but will also prepare their network to seamlessly integrate into future IT.
-
6 Guidelines for Crafting a Charter for Your Business Transformation
22/01/2019 Duration: 22minBusiness transformation is not a roadmap that your business will follow, step by step, milestone after milestone, until you reach a destination or end-goal called “digital transformation.” A final destination does not exist—transformation is more like an on-going charter—you set out with well-reasoned and well-supported intentions (a strong business case and buy-in from the C-suite) for your business to venture into the future. The unexpected will occur, but your business will learn from it. Listen to this episode to learn about 6 guidelines for crafting a charter for your business transformation: Define what transformation means to your enterprise and your customer. Align IT and business. Laser-focus on one thing you do really well. Lead with a Tiger Team—and make it a brilliant one. Innovation is the key driver of transformation and, to innovate, you must allow for iteration and failure. Build in security and privacy.
-
3 Keys to Web Application Security
28/11/2018 Duration: 13minWeb applications are under siege as hackers work around the clock to identify weak spots and steal data. Last year’s Equifax data breach put a spotlight on web-application vulnerabilities, which can be used to target any organization with an internet presence. Cyber attackers have embraced the use of automation to scan applications for vulnerabilities. Protecting against application-layer techniques such as SQL injection (SQLi), cross-site scripting (XSS), cross-site request forgery (CSRF) and distributed denial of service (DDoS) is imperative, but automated attacks can overwhelm existing security solutions. Listen to this episode to learn: How to maintain awareness of evolving web application issues and trends Tips for advancing patch management and vulnerability assessment processes Solutions that leverage DDoS defenses, bot mitigation, artificial intelligence (AI) and API endpoint protection to combat automated attacks Techniques for protecting apps in multi-cloud infrastructures Best practices for
-
Moving Beyond Passwords with Risk-Based MFA
20/11/2018 Duration: 14minLast year, the impacts of the WannaCry, NotPetya, and Equifax cyber attacks were closely followed by the stunning disclosure of the Meltdown and Spectre vulnerabilities, increasing the sense of urgency around cybersecurity and driving spending higher than ever before. Despite increased spending on security products and services, the number of data breaches continues to rise. Funding doesn’t guarantee successful security. Organizations often waste valuable resources on practices that fail to protect against evolving threats, and continue to prop up password security. Listen to this episode to learn: Why the latest version of the CIS Controls has removed all references to passwords How multi-factor authentication (MFA) can make access hard for hackers, but easy for users The advantage of risk-based authentication mechanisms How to identify the authentication solution that is best for your organization Best practices for avoiding MFA implementation pitfalls
-
Boost Your Data Strategy With Unstructured Data
30/10/2018 Duration: 20minData deluge can be discouraging, but a good data strategy is all about gaining value from all of your data — no matter the format. Traditionally, data was held in structured databases, but in today’s digital age, organizations are accessing unstructured data from numerous sources and often in large amounts. Sources such as web clickstreams, text messages, social media inputs, text documents, videos and medical imaging. Management of this unstructured big data can be an undertaking, but once reviewed and analyzed properly, it will provide actionable business insights. The more data accessed and analyzed, the more knowledge about the business will be revealed, providing a clearer picture of how to meet organizational goals and customer expectations. However, making sense of all the unstructured data requires a great deal of planning before attempting to monetize it. When an organization takes the time to understand this data, it will gain insights that can help make better business decisions and transform the w
-
A Tale of Two Data Center Strategies: Hyperconverged vs. Composable
23/10/2018 Duration: 20minIt’s the best of times, it’s the worst of times; it’s the age of new converged technologies, it’s the age of tightening IT budgets. Figuring out how to minimize the data center footprint, protecting data, driving down costs without sacrificing performance or resiliency; the largest initiative IT administrators are undertaking today is setting up infrastructure to help support business outcomes. This drive comes from the outstanding business need to turn ideas into value faster than the competition. In this podcast, we discuss how IT organizations can keep core legacy systems up and running while integrating new technologies to support business goals. Listen to this episode to learn: The advantages of hyper-connected enterprise The difference between hyperconverged systems and composable infrastructure How bringing together compute, storage and networking into a single platform can boost business How to choose the right mix of converged technologies for you
-
The Curious Case of Hybrid IT: 5 Things to Avoid
09/10/2018 Duration: 20minWhile many organizations are making a calculated leap to hybrid IT, some are stumbling upon the hybrid design by chance. In a recent survey conducted by Forrester, two-thirds of the organizations ended up with hybrid IT by accident. Additionally, only 33 percent of the businesses had designed a comprehensive hybrid IT strategy from the ground up. The other interviewees reported having to triage an organic model, or that their current plans are spinning out of control. Trying to transform your company’s infrastructure without the correct strategy and technical expertise can severely disrupt your business. It can lead to an unmanageable and risky mix of workload-specific hardware platforms and shadow IT that could tie your organization in knots. Listen to this episode to learn: Best practices for hybrid IT implementation Advantages and disadvantages of hybrid IT Tips for leveraging the latest hybrid IT tools How to find the right mix of traditional, on-prem environments, along with private and public clouds
-
Reducing Data Loss Risk with DLP
26/09/2018 Duration: 11minIn today’s threat landscape, protecting data is critical to security and regulatory compliance. Organizations in all industries have become lucrative targets for hackers, and data breaches are making headlines on a daily basis. Companies need to find solutions that can help them protect sensitive data, while at the same time empowering employees to work across devices, connect to multiple networks, and work within cloud applications. Listen to this episode to learn: How DLP technology has evolved The critical role it can play in helping organizations maintain compliance with strict data protection and privacy requirements such as those within the GDPR The path to successfully extending DLP policy enforcement to the cloud, and addressing shadow IT issues Complementary solutions that integrate with DLP to provide comprehensive data-centric security
-
A Crash Course in Securing Your Data
10/09/2018 Duration: 10minThe key to defining data protection for your business is understanding the type of data you collect and knowing how you store and manage it. By classifying your data, you can gain a thorough understanding of your business needs and data protection goals, which will make it easier for you to build a data protection strategy that’s up to the task. In this episode of And There You Have IT!, industry experts from Sirius and Dell EMC give us a crash course on data protection and where to start when building a strategy. Listen to this episode learn: The basics of data protection The importantce of data classification How data should be classified Key steps and tools to get started with
-
A Guide to the Multi-Cloud Data Management Challenge
31/08/2018 Duration: 14minIn this episode of And There You Have IT, industry experts discuss what to consider when developing a multi-cloud data management strategy. They’ll cover all the reasons why it’s a good idea to have a strategy in place, the most common challenges businesses face when developing one and the best things to keep in mind. Listen to this episode learn: The benefits of implementing a multi-cloud strategy How a multi-cloud strategy can protect your most important data What to focus on when building a strategy Common challenges to avoid